Flaws were discovered in the way PCRE handles certain malformed regularexpressions. If an application linked against PCRE parses a maliciousregular expression, it may have been possible to run arbitrary code as theuser running the application. (CVE-2006-7228, CVE-2007-1660)

Users of PCRE are advised to upgrade to these updated packages, whichcontain backported patches to resolve these issues.

Red Hat would like to thank Ludwig Nussel for reporting these issues.

4. Solution:

Before applying this update, make sure that all previously-releasederrata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available athttp://kbase.redhat.com/faq/FAQ_58_10188